Search Results

Showing 411-420 from 854

Using Free Diagnostic Reports (in Comodo GeekBuddy)

...run a quick system health-check and provide an alert if issues are found:       Click 'Fix it Now - Live Support' to connect with a GeekBuddy operative who can help you fix the issue. GeekBuddy Interface Click the 'FREE DIAGNOSTIC Reports' button on the left:     The report will open, listing all detected problems: Problems are categorized...

http://help.comodo.com/topic-86-1-416-4622-Using-Free-Diagnostic-Reports.html
Using Free Diagnostic Reports (in Comodo Internet Security)

...run a quick system health-check and provide an alert if issues are found: Click 'Fix it Now - Live Support' to connect with a GeekBuddy operative who can help you fix the issue. GeekBuddy Interface Click the 'FREE DIAGNOSTIC Reports' button on the left:  The report will open, listing all detected problems: Problems are categorized as critical, major, minor...

http://help.comodo.com/topic-72-1-623-7638-Using-Free-Diagnostic-Reports.html
Use The WebIDE (in Comodo IceDragon)

...run and debug the application: Set up a runtime Create an app or open an existing app Install the app on the runtime Open WebIDE Click the hamburger at the top-right Select 'Web Developer' > ' WebIDE'. Alternatively, click the 'Customize' button from the menu on the bottom-right Select the WebIDE  icon and dock it at the bar Click...

http://help.comodo.com/topic-169-1-413-8697-Use-the-WebIDE.html
Validating Your Website (in Comodo Web Inspector)

...run an automated check and verify domain control based on the presence of this file. Download the text file by clicking 'file' Upload it to root folder of your web server After the text file has been uploaded, click the 'VERIFY' button. Comodo will check for existence of this file to prove domain control After successful verification, 'Manage' and 'TrustLogo...

http://help.comodo.com/topic-208-1-490-5749-Validating-your-Website.html
Adding Websites For Daily Blacklist Monitoring And Malware Scanning (in Comodo Web Inspector)

...run an automated check and verify domain control based on the presence of this file. Download the text file by clicking 'file' Upload it to root folder of your web server After the text file has been uploaded, click the 'VERIFY' button. Comodo will check for existence of this file to prove domain control After successful verification, 'Manage' and 'TrustLogo...

http://help.comodo.com/topic-208-1-490-5115-Adding-Websites-for-Daily-Blacklist-Monitoring-and-Malware-Scanning.html
Miscellaneous Settings (in Advanced Endpoint Protection)

...run malicious code or make the program operate incorrectly. Exclude certain applications from shellcode injection protection Make sure 'Don't detect shellcode injections in these applications' is enabled then click the 'these applications' link. The 'Manage Exclusions' dialog appears. Click the 'Add' button at the top You can add items by selecting the required option from the drop-down:   File...

http://help.comodo.com/topic-467-1-1050-16698-Miscellaneous-Settings.html
Mass Management Of Campaigns (in Xcitium Platform)

...run concurrently for the same product but with different audiences, different close dates and different expected/actual costs. Tip : If you want to update the details of a single campaign record: Open the 'Campaign List', click the campaign name then click the 'Edit' button. See Track Campaigns for more details. The interface allows you to: Edit campaign records Delete campaign records...

http://help.comodo.com/topic-457-1-983-14590-Mass-Management-of-Campaigns.html
Protected Keys (in Xcitium Enterprise)

...running in the container. Adding important registry keys to this area will protect them from unknown and potentially malicious programs. Open the 'Protected Keys' section Click 'Settings' on the XCS home screen Click 'Containment' > 'Protected Objects' Select the 'Protected Keys' tab The buttons at the top provide the following options: Add - Select registry groups or individual keys that you want...

http://help.comodo.com/topic-463-1-1033-15965-Protected-Keys.html
Protected Keys (in Advanced Endpoint Protection)

...running in the container. Adding important registry keys to this area will protect them from unknown and potentially malicious programs. Open the 'Protected Keys' section Click 'Settings' on the CCS home screen Click 'Containment' > 'Protected Objects' Select the 'Protected Keys' tab The buttons at the top provide the following options: Add  - Select registry groups or individual keys that...

http://help.comodo.com/topic-467-1-1050-16673-Protected-Keys.html
Protected Keys (in Endpoint Manager)

...running in the container. Adding important registry keys to this area will protect them from unknown and potentially malicious programs. Open the 'Protected Keys' section Click 'Settings' on the CCS home screen Click 'Containment' > 'Protected Objects' Select the 'Protected Keys' tab The buttons at the top provide the following options: Add - Select registry groups or individual keys that you want...

http://help.comodo.com/topic-399-1-904-13786-Protected-Keys.html
Pages 42 of 86 « Prev     Next »   Jump to page